Category: Security

Sort By Category

Ransomware: What It Is & How To Remove It From Your Computer

Ransomware: What It Is & How To Remove It From Your Computer

Ransomware, or hostage malware, is a type of malware that can encrypt data and files so they will not open up, prevent you from accessing your computer, or make programs inaccessible. In order to return access or decrypt the files, the attacker demands a ransom to be...

Understanding Malware: How Cyber-Criminals Launch Their Attacks

Understanding Malware: How Cyber-Criminals Launch Their Attacks

The internet is full of bad actors—people with malicious intent out to steal your information and use it in potentially costly ways. A new study by McAfee and the Center for Strategic and International Studies (CSIS) suggests the cost of global cyber-crime was $600...

CloudFlare Bug Potentially Exposes Private Information

CloudFlare Bug Potentially Exposes Private Information

Nerds Hosting uses CloudFlare to power certain aspects of our hosting infrastructure, and thus we felt it important to share some thoughts on the CloudFlare bug that was exposed last week. Unfortunately, the bug in question is very technical in nature and hard to...

Don't let your heart bleed over Heartbleed

Don't let your heart bleed over Heartbleed

It's a good thing when a technology vulnerability gets enough attention that it is patched quickly and methodically. However, it may also raise undue concern due to its complex nature and variety of headlines that leave us consumers confused and unsure what to do. The...

Don’t let your heart bleed over Heartbleed

Don’t let your heart bleed over Heartbleed

It's a good thing when a technology vulnerability gets enough attention that it is patched quickly and methodically. However, it may also raise undue concern due to its complex nature and variety of headlines that leave us consumers confused and unsure what to do. The...

Identity Theft Tactics – be aware and protect yourself

Identity Theft Tactics – be aware and protect yourself

Identity Theft is a horrible experience to go through. Just ask anyone who has been victimized. It can takes many years to arrive at a full recovery. So it makes sense to be vigilant about being a victor instead of a victim, as author Dianne Ojar-Ali alerts us in her...

Do you have one of the 80 million unsecured routers?

Do you have one of the 80 million unsecured routers?

In the midst of all the security alerts you and we receive on a regular basis, this one stands out and you can and should take immediate action. Router manufacturers whose products are affected by the UPnP vulnerabilities include Cisco-owned Linksys, Netgear, Belkin...

Peekaboo I See You – how to privatize your Internet cameras

Peekaboo I See You – how to privatize your Internet cameras

Here is a map of Trendnet Webcams that were/are publicly viewable by anyone in the world with an Internet connection. Hopefully yours isn't among them! While this story became very public and it's about the Trendnet Internet cameras specifically, they are not the only...